Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe SpringerBriefs in Computer Science

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • von Jiang Wang, Zicheng Liu & Ying Wu
    50,00 €

    Action recognition technology has many real-world applications in human-computer interaction, surveillance, video retrieval, retirement home monitoring, and robotics. The commoditization of depth sensors has also opened up further applications that were not feasible before. This text focuses on feature representation and machine learning algorithms for action recognition from depth sensors. After presenting a comprehensive overview of the state of the art, the authors then provide in-depth descriptions of their recently developed feature representations and machine learning techniques, including lower-level depth and skeleton features, higher-level representations to model the temporal structure and human-object interactions, and feature selection techniques for occlusion handling. This work enables the reader to quickly familiarize themselves with the latest research, and to gain a deeper understanding of recently developed techniques. It will be of great use for both researchers andpractitioners.

  • von Xun Yi, Russell Paulet & Elisa Bertino
    67,00 €

    From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. This volume achieves a balance between the theoretical and the practical components of modern information security.

  • von Eric Hardin, Helena Mitasova, Laura Tateosian & usw.
    50,00 €

    This SpringerBrief presents the principles, methods, and workflows for processing and analyzing coastal LiDAR data time-series. Simple methods for potential storm impacts and inundation pattern analysis are also covered, along with visualization techniques to support analysis of coastal terrain feature and surface dynamics.

  • - Using MRFalign
    von Jinbo Xu, Sheng Wang & Jianzhu Ma
    50,00 €

    The text first surveys a few popular homology detection methods, such as Position-Specific Scoring Matrix (PSSM) and Hidden Markov Model (HMM) based methods, and then describes a novel Markov Random Fields (MRF) based method developed by the authors.

  • von Weihua Zhuang & Hassan Aboubakr Omar
    50,00 €

    This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs.

  • von Peng Li & Song Guo
    50,00 €

    This brief examines current research on cooperative device-to-device (D2D) communication as an enhanced offloading technology to improve the performance of cognitive radio cellular networks.

  • - Systems and Solutions
    von Borko Furht, Aleksandar Colic & Oge Marques
    50,00 €

    This SpringerBrief presents the fundamentals of driver drowsiness detection systems, provides examples of existing products, and offers guides for practitioners interested in developing their own solutions to the problem.

  • von Feifei Gao, Chengwen Xing & Gongpu Wang
    50,00 €

    This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. The authors discuss the channel estimation strategies over typical fading scenarios, including frequency flat fading, frequency selective fading and time selective fading, as well as future research directions.

  • von Dizhi Zhou & Wei Song
    49,00 €

    This brief presents several enhancement modules to Multipath Transmission Control Protocol (MPTCP) in order to support stable and efficient multipath transmission with user cooperation in the Long Term Evolution (LTE) network.

  • von Tho Le-Ngoc, Leonardo Jimenez Rodriguez & Nghi Tran
    50,00 €

    This SpringerBrief explores the advantage of relaying techniques in addressing the increasing demand for high data rates and reliable services over the air.

  • von Tom H. Luan, Longxiang Gao, Shui Yu & usw.
    50,00 €

    This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology.

  • - Handling Multi-Trillion Particles in Nanofluidics
    von Alexander Heinecke, Wolfgang Eckhardt, Martin Horsch & usw.
    50,00 €

    This work presents modern implementations of relevant molecular dynamics algorithms using ls1 mardyn, a simulation program for engineering applications. The text focuses strictly on HPC-related aspects, covering implementation on HPC architectures, taking Intel Xeon and Intel Xeon Phi clusters as representatives of current platforms.

  • - Summarization, Interpolation and Surveillance
    von Annalisa Appice, Anna Ciampi, Fabio Fumarola & usw.
    49,00 €

    Sensor networks comprise of a number of sensors installed across a spatially distributed network, which gather information and periodically feed a central server with the measured data. One solution is to compute summaries of the data as it arrives, and to use these summaries to interpolate the real data.

  • von Dan Wang & Zhu Han
    49,00 €

    The brief focuses on applying sublinear algorithms to manage critical big data challenges. It also demonstrates how to apply sublinear algorithms to three familiar big data applications: wireless sensor networks, big data processing in Map Reduce and smart grids.

  • von Yingjiu Li, Qiang Yan & Robert H. Deng
    50,00 €

    This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey.

  • - Media Playback and Digital Video Broadcast
    von Benjamin Michele
    47,00 €

    This book discusses the emerging topic of Smart TV security, including its implications on consumer privacy. The author presents chapters on the architecture and functionality of Smart TVs, various attacks and defenses, and associated risks for consumers.

  • - Using IoT Services and Integration Patterns
    von Umit Isikdag
    50,00 €

    This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and integrate Building Information Models (BIMs). Chapter 6 provides advanced SOA patterns for BIMs, while chapter 7 details patterns for IoT, and for BIM and IoT information fusion.

  • - Semantics, Techniques and Usage Scenarios
    von Deepak P & Prasad M. Deshpande
    50,00 €

    The authors systematically survey the set of similarity operators, primarily focusing on their semantics, while also touching upon mechanisms for processing them effectively.The book starts off by providing introductory material on similarity search systems, highlighting the central role of similarity operators in such systems.

  • - The History and Technology of Message Privacy
    von Hilarie Orman
    50,00 €

    Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption.

  • von Cliff Wang, Wenye Wang & Zhou Lu
    50,00 €

    An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications.

  • von John Davis, Stefan Pappe, Kristof Kloeckner, usw.
    53,00 €

    As more and more industries are experiencing digital disruption, using information technology to enable a competitive advantage becomes a critical success factor for all enterprises. This book covers the authors' insights on how AI technologies can fundamentally reshape the IT services delivery lifecycle to deliver better business outcomes through a data-driven and knowledge-based approach. Three main challenges and the technologies to address them are discussed in detail:· Gaining actionable insight from operational data for service management automation and improved human decision making· Capturing and enhancing expert knowledge throughout the lifecycle from solution design to ongoing service improvement · Enabling self-service for service requests and problem resolution, through intuitive natural language interfacesThe authors are top researchers and practitioners with deep experience in the fields of artificial intelligence and IT service management and are discussing both practical advice for IT teams and advanced research results. The topics appeal to CIOs and CTOs as well as researchers who want to understand the state of the art of applying artificial intelligence to a very complex problem space. Although the book is concise, it comprehensively discuss topics like gaining insight from operational data for automatic problem diagnosis and resolution as well as continuous service optimization, AI for solution design and conversational self-service systems.

  • - Protocols, Models, Tests, Data, Risk and Applications
    von B. R. Wienke & T. R. O'Leary
    47,00 €

    This brief provides a complete yet concise description of modern dive computers and their operations to date in one source with coupled applications for added understanding. Basic diving principles are detailed with practical computer implementations. Interrelated topics to diving protocols and operational procedures are included. Tests, statistics and correlations of computer models with data are underscored. The exposition also links phase mechanics to dissolved gases in modern decompression theory with mathematical relationships and equations used in dive computer synthesis. Applications focus upon and mimic dive computer operations within model implementations for added understanding.This comprehensive resource includes a complete list of dive computers that are marketed and their staging models, as well as a complete list of diveware marketed and their staging algorithms, linkage of pertinent wet and dry tests to modern computer algorithms, a description of two basic computer models with all constants and parameters, mathematical ansatz of on-the-fly risk for surfacing at any dive depth, detailing of statistical techniques used to validate dive computers from data, and a description of profile Data Banks for computer dive model correlations.The book will find an audience amongst computer scientists, doctors, underwater researchers, engineers, physical and biosciences diving professionals, explorers, chamber technicians, physiologists and technical and recreational divers.

  • von Xinyuan Wang & Douglas Reeves
    50,00 €

  • - Algorithms, Tools and Strategies for Robotic Networks
    von Carlos Sagues, Rosario Aragues & Youcef Mezouar
    49,00 €

  • von Atle Refsdal
    67,00 €

    This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence.

  • - A Survey
    von Johannes Buchmann, Giulia Traverso & Denise Demirel
    50,00 €

    Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework.

  • von Hongzhi Yin & Bin Cui
    50,00 €

    This book covers the major fundamentals of and the latest research on next-generation spatio-temporal recommendation systems in social media.

  • - Concepts and Techniques for Summarization
    von Dev Oliver
    50,00 €

    This brief explores two of the main challenges of spatial network data analysis: the many connected components in the spatial network and the many candidates that have to be processed.

  • von Channapragada Rama Seshagiri Rao & Munaga V.N.K. Prasad
    50,00 €

    Next, four digital watermarking techniques based on curvelet transforms are discussed: Image Watermarking Using Curvelet Transform (WCT), Watermark Wavelets in Curvelets of Cover Image (WWCT), Resized Watermark into Curvelets of Cover Image (RWCT), and Resized Watermark Wavelets into Curvelets of Cover Image (RWWCT).

  • von Rae Earnshaw
    50,00 €

    This book details how research and development in art and design can be formulated, progressed, measured, and reviewed. Research and Development in Art, Design and Creativity is an essential read for anyone interested in the concept of collaboration and communication and how this applies to art and its creation.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.